共 27 条
[1]
Babu S.S., Raha A., Naskar M.K., Article: Trustworthy route formation algorithm for wsns, International Journal of Computer Applications, 27, 5, pp. 35-39, (2011)
[2]
Boukerch A., Xu L., El-Khatib K., Trust-based security for wireless ad hoc and sensor networks, Computer Communications, 30, 11-12, pp. 2413-2427, (2007)
[3]
Castelfranchi C., Engineering social order, Proceedings of the 2nd International Workshop on Engineering Societies in the Agent's World (esaw'00), (2000)
[4]
Castelluccia C., Francillon A., Protéger les réseaux de capteurs sans fil., 6e Symposium sur la Sécurité des Technologies de l'Information et des Communications, pp. 1-11, (2008)
[5]
Chen H., Wu H., Hu J., Gao C., Agent-based trust management model for wireless sensor networks, International Conference on Multimedia and Ubiquitous Engineering, pp. 150-154, (2008)
[6]
Dai H., Jia Z., Qin Z., Trust evaluation and dynamic routing decision based on fuzzy theory for manets, Journal of Sofware, 4, 10, pp. 1091-1101, (2009)
[7]
Despotovic Z., Aberer K., P2P reputation management: Probabilistic estimation vs. Social networks, Computer Networks, 50, 4, pp. 485-500, (2006)
[8]
Fournel N., Minier M., Ubeda S., Survey and benchmark of stream ciphers for wireless sensor networks, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4462, pp. 202-214, (2007)
[9]
Griffiths N., Jhumka A., Dawson A., Myers R., A simple trust model for on-demand routing in mobile ad-hoc networks, Proceedings of the 2nd International Symposium on Intelligent Distributed Computing, 162, pp. 105-114, (2008)
[10]
Han G., Choi D., Lim W., A novel sensor node selection method based on trust for wireless sensor networks, International Conference on Wireless Communications, Networking and Mobile Computing, pp. 2397-2400, (2007)